Analysis

  • max time kernel
    33s
  • max time network
    44s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/09/2024, 10:59

General

  • Target

    sgnsd.exe

  • Size

    216KB

  • MD5

    082c8a659fa07a63f6078b1cbd00ae2a

  • SHA1

    ad6838c2971e01120b5f1c4a264d090c74fa0816

  • SHA256

    bf4bd835390e2607c737360a2527ea292bd0451507f93b623d3f9bbf4036c2fe

  • SHA512

    57eeb9cf08eb6d68941b029465771fb5f5aedb34f73d06212f0480f5cccf72873d6c75abf5346d8c352c65fbe5959dbc9323015b35416b278db999f6304a0b6a

  • SSDEEP

    6144:XTlqP0Xx9vlkheKNH+exE+NkO24Y9EV9GEO:jlbXLCh8ElCNEV9GEO

Malware Config

Extracted

Family

stealc

Botnet

default

C2

http://46.8.231.109

Attributes
  • url_path

    /c4754d4f680ead72.php

Extracted

Family

vidar

C2

https://t.me/edm0d

https://steamcommunity.com/profiles/76561199768374681

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 OPR/110.0.0.0

Signatures

  • Detect Vidar Stealer 17 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 5 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\sgnsd.exe
    "C:\Users\Admin\AppData\Local\Temp\sgnsd.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2560
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
      • Checks computer location settings
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1580
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminGHIDGDHCGC.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3764
        • C:\Users\AdminGHIDGDHCGC.exe
          "C:\Users\AdminGHIDGDHCGC.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4280
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            5⤵
            • Drops file in Program Files directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3428
            • C:\Program Files\Google\Chrome\Application\W7BIT5QBV7P03JLWL6QNI.exe
              "C:\Program Files\Google\Chrome\Application\W7BIT5QBV7P03JLWL6QNI.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:64
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminCAEHJEBKFC.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3124
        • C:\Users\AdminCAEHJEBKFC.exe
          "C:\Users\AdminCAEHJEBKFC.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2004
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            5⤵
            • Checks computer location settings
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2084
            • C:\ProgramData\JDAKJJDBGC.exe
              "C:\ProgramData\JDAKJJDBGC.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:696
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                7⤵
                • Drops file in Program Files directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:1000
                • C:\Program Files\Google\Chrome\Application\D73PFK4VN9AZFKBC.exe
                  "C:\Program Files\Google\Chrome\Application\D73PFK4VN9AZFKBC.exe"
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:3400
            • C:\ProgramData\BKJKJEHJJD.exe
              "C:\ProgramData\BKJKJEHJJD.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:4608
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                7⤵
                  PID:2628
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  7⤵
                  • System Location Discovery: System Language Discovery
                  PID:3700
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\JJEGIJEGDBFH" & exit
                6⤵
                  PID:760
                  • C:\Windows\SysWOW64\timeout.exe
                    timeout /t 10
                    7⤵
                    • Delays execution with timeout.exe
                    PID:3880

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\Google\Chrome\Application\W7BIT5QBV7P03JLWL6QNI.exe

        Filesize

        63KB

        MD5

        0d5df43af2916f47d00c1573797c1a13

        SHA1

        230ab5559e806574d26b4c20847c368ed55483b0

        SHA256

        c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc

        SHA512

        f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2

      • C:\ProgramData\EGIDBFBFHJDG\BGIIEG

        Filesize

        20KB

        MD5

        a603e09d617fea7517059b4924b1df93

        SHA1

        31d66e1496e0229c6a312f8be05da3f813b3fa9e

        SHA256

        ccd15f9c7a997ae2b5320ea856c7efc54b5055254d41a443d21a60c39c565cb7

        SHA512

        eadb844a84f8a660c578a2f8e65ebcb9e0b9ab67422be957f35492ff870825a4b363f96fd1c546eaacfd518f6812fcf57268ef03c149e5b1a7af145c7100e2cc

      • C:\ProgramData\EGIDBFBFHJDG\CFBFHI

        Filesize

        40KB

        MD5

        a182561a527f929489bf4b8f74f65cd7

        SHA1

        8cd6866594759711ea1836e86a5b7ca64ee8911f

        SHA256

        42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

        SHA512

        9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

      • C:\ProgramData\EGIDBFBFHJDG\CFBFHI

        Filesize

        160KB

        MD5

        f310cf1ff562ae14449e0167a3e1fe46

        SHA1

        85c58afa9049467031c6c2b17f5c12ca73bb2788

        SHA256

        e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855

        SHA512

        1196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad

      • C:\ProgramData\JJEGIJEGDBFH\AKFIDH

        Filesize

        116KB

        MD5

        f70aa3fa04f0536280f872ad17973c3d

        SHA1

        50a7b889329a92de1b272d0ecf5fce87395d3123

        SHA256

        8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

        SHA512

        30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

      • C:\ProgramData\JJEGIJEGDBFH\DGHJEC

        Filesize

        11KB

        MD5

        b2e7aee8d22c4d8eb6ab3d75cb1ba0f3

        SHA1

        0b55c9ec1b0bd4a5d432387ece491ba52a95116a

        SHA256

        8564620a037a8ecd83b20413e0c3e572b67308f775d553dea87597498d3d85af

        SHA512

        d82d11154ac45df6d3d923d49bfc0a86b742ae717050db0703a698a5d8ddc5960ea183d39acd82e38adf117db93430ea7c53bcdf8f90c3d01bb1fdfffff66c2a

      • C:\ProgramData\JJEGIJEGDBFH\HJKJKK

        Filesize

        114KB

        MD5

        c3311360e96fcf6ea559c40a78ede854

        SHA1

        562ada1868020814b25b5dbbdbcb5a9feb9eb6ba

        SHA256

        9372c1ee21c8440368f6dd8f6c9aeda24f2067056050fab9d4e050a75437d75b

        SHA512

        fef308d10d04d9a3de7db431a9ab4a47dc120bfe0d7ae7db7e151802c426a46b00426b861e7e57ac4d6d21dde6289f278b2dbf903d4d1d6b117e77467ab9cf65

      • C:\ProgramData\freebl3.dll

        Filesize

        669KB

        MD5

        550686c0ee48c386dfcb40199bd076ac

        SHA1

        ee5134da4d3efcb466081fb6197be5e12a5b22ab

        SHA256

        edd043f2005dbd5902fc421eabb9472a7266950c5cbaca34e2d590b17d12f5fa

        SHA512

        0b7f47af883b99f9fbdc08020446b58f2f3fa55292fd9bc78fc967dd35bdd8bd549802722de37668cc89ede61b20359190efbfdf026ae2bdc854f4740a54649e

      • C:\ProgramData\mozglue.dll

        Filesize

        593KB

        MD5

        c8fd9be83bc728cc04beffafc2907fe9

        SHA1

        95ab9f701e0024cedfbd312bcfe4e726744c4f2e

        SHA256

        ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

        SHA512

        fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

      • C:\ProgramData\msvcp140.dll

        Filesize

        439KB

        MD5

        5ff1fca37c466d6723ec67be93b51442

        SHA1

        34cc4e158092083b13d67d6d2bc9e57b798a303b

        SHA256

        5136a49a682ac8d7f1ce71b211de8688fce42ed57210af087a8e2dbc8a934062

        SHA512

        4802ef62630c521d83a1d333969593fb00c9b38f82b4d07f70fbd21f495fea9b3f67676064573d2c71c42bc6f701992989742213501b16087bb6110e337c7546

      • C:\ProgramData\nss3.dll

        Filesize

        2.0MB

        MD5

        1cc453cdf74f31e4d913ff9c10acdde2

        SHA1

        6e85eae544d6e965f15fa5c39700fa7202f3aafe

        SHA256

        ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

        SHA512

        dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

      • C:\ProgramData\softokn3.dll

        Filesize

        251KB

        MD5

        4e52d739c324db8225bd9ab2695f262f

        SHA1

        71c3da43dc5a0d2a1941e874a6d015a071783889

        SHA256

        74ebbac956e519e16923abdc5ab8912098a4f64e38ddcb2eae23969f306afe5a

        SHA512

        2d4168a69082a9192b9248f7331bd806c260478ff817567df54f997d7c3c7d640776131355401e4bdb9744e246c36d658cb24b18de67d8f23f10066e5fe445f6

      • C:\ProgramData\vcruntime140.dll

        Filesize

        78KB

        MD5

        a37ee36b536409056a86f50e67777dd7

        SHA1

        1cafa159292aa736fc595fc04e16325b27cd6750

        SHA256

        8934aaeb65b6e6d253dfe72dea5d65856bd871e989d5d3a2a35edfe867bb4825

        SHA512

        3a7c260646315cf8c01f44b2ec60974017496bd0d80dd055c7e43b707cadba2d63aab5e0efd435670aa77886ed86368390d42c4017fc433c3c4b9d1c47d0f356

      • C:\Users\AdminCAEHJEBKFC.exe

        Filesize

        292KB

        MD5

        9d0327bd2962fd98512fb4ad5fc9ad19

        SHA1

        37fd2898d15b6e4e4be596c11120649e374a091b

        SHA256

        86d1e9372127505a6200e134641390297bd255de3b742d874108cbf5670d3d9c

        SHA512

        9a768adcd08acc5766d2b7a46e1360c2a2551405248bf774bc736b196d902bbeee56e472bd8f94a8c993f54e6e2402a9a14d6131500cf7979b89ccdbdd6ecc15

      • C:\Users\AdminGHIDGDHCGC.exe

        Filesize

        338KB

        MD5

        7abd5004d90827227cb77ecebc6c0aba

        SHA1

        39c7f736d4041cb246b31d34f455460cdc3a071e

        SHA256

        13d8eb0461863ad7a6f2cd6c20133e6141b7ee60c2cfa16be07b050a1702b5ad

        SHA512

        7d95b29386c7a42da65be1888ce33d1e6e323da9e667cd72def869da3dfd60209b023d03e5258fcf52a71d7d2dd9a98e620cd1a44bc0e68da6d9567041a5e616

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0255CEC2C51D081EFF40366512890989_8A726233B0F9B64FE822B7A4065CB375

        Filesize

        471B

        MD5

        ed903dc101ccbb537798c3ce32180750

        SHA1

        9161ca52412344f139d0ea20f1a2774a3bd1aa27

        SHA256

        1cc1c4833c2571b964ae7cea986357d5089491d1b99995375a6aadfca10cf88b

        SHA512

        87626250eab1decdd95c7f6471fa375945aefe0d613e53b35271d83fa1d5caddeb313b22ecaa5067866e80803f223fda722ad3e7cc64d5650fe42bd8e4616269

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\156887258BBD6E1FEF562837733EA04E_5BBC02CEDFD3F7AC9E268D830CF231EE

        Filesize

        2KB

        MD5

        d61c16c5dd12dce62b0311b4f5ae4702

        SHA1

        695352e746dbbf0d30b2ecd435c39e625f319b1a

        SHA256

        efdd18ad7b3d60cc9ee00dbcb26fe85b22096b21b10276bf70191da590252d07

        SHA512

        1b63567a9ea59457433aaaad1158fb5fd95b4b5bb88b5e099e38917206578556ead19accf0b1257db4a51c8f892fe3e91e1aed3353e0e66e5991315e92db62cf

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

        Filesize

        2KB

        MD5

        e2e9309062d386d7fec2730d865be1b3

        SHA1

        30dbe40a07dd56429b70601ff35c954d78ee99b9

        SHA256

        01459ba654c52454a8dae37f078fffc280d3a13b55837fd82d05a9c902e88ebb

        SHA512

        46ec1842ed5b93bf5e2533ce2561b0035ff0beb8e5ce61ecb2ec7bdb13f54e38a7a44d258b6713deb5278b39a6cd8b8dff349d3a2a088f9f4014eed6262f6b63

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDA

        Filesize

        2KB

        MD5

        64be459578e3fccb849db1bac572e264

        SHA1

        e5333f9ed228dc7edd9b6b23ce23cc6b8dc59606

        SHA256

        e871fd44eb45caf8fa511a0b2eededc9a64edf7874b72b1d91f29d6ce05c06c9

        SHA512

        f20ab1b54a89aa86571614ea0d5ce12f220f43ad2d8f470bf4fa0fb3c86debe76a44b2b7bd19a19d07a383fed76a2462d0784690d82c95778028e0513954386b

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691

        Filesize

        1KB

        MD5

        1cc4567f3b4498d86d59c906282f0bf8

        SHA1

        a0a19735d3d484c327a654923258598ad9d4e8ef

        SHA256

        e47ca5deb9fbb8ab95c49613e9f317344d66090e9c4d5107e8b11f268ee77354

        SHA512

        d781c81cd0f33b738cf1c5401630bba9ec6f5d3787369def9f8365596b0a3afa7126212d13b462df53afcda2c0cfe62c1a92af053e49f8e44733556d1c147127

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D

        Filesize

        1KB

        MD5

        66a1250945d5954ccd7a7270c292cdfb

        SHA1

        eef0640046e6b10662d2b2ff6f419bffd911c727

        SHA256

        4b7cf758eb8582e21a9915f9710a9dc30050df83ddd1fd374c358bf5d0bd2897

        SHA512

        3ac2725dfefe50f6f6e96853c7f9f647c5fe1c7fc762c0e777770d0f89d4ac8fad0886ff1ffb6475fbc6307935a1068a5567b940789e892edec7eb4599e943b3

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0255CEC2C51D081EFF40366512890989_8A726233B0F9B64FE822B7A4065CB375

        Filesize

        490B

        MD5

        83eda76f019aad8f14d114f91fb3ab50

        SHA1

        e80a0f126704b3d8e0a2bc080e8479e83a76ae8c

        SHA256

        c25acabaab5148e4b4d6e1ed5cdd6638a3a4cab3e0e1b948b5caec63b2980022

        SHA512

        869381d76a504ca8bd201dda3226336e48b29c3e3f6e767d7bd195209f59c18daf2911917ac4b51240355f9df0db11b06410f475a7a3a9bc06b19693f0bffc56

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\156887258BBD6E1FEF562837733EA04E_5BBC02CEDFD3F7AC9E268D830CF231EE

        Filesize

        458B

        MD5

        f3f0f14c5854816e4273530c8c278c3a

        SHA1

        23c89e895b567d4f5175af511fc2ded3f89944d1

        SHA256

        39090d2db87a6de0aad66af626c0f3f3f3f57dcf36ae4a832c5e42a02fab077a

        SHA512

        300d1873faddca6ea9e2285c96840c248b9892ff0e54ee6462376ba5603bae587c91c5cc63ee5bccb3cedf00f295f2b242fb86a6d9d092407cadce03bb46c80d

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

        Filesize

        450B

        MD5

        848270f2d604ae6abb827728faa0fe90

        SHA1

        6726d0dce14250e38ee32076f71d9c45e246d57f

        SHA256

        3b70748bf2432728806040e8383c68f258d269feafd24174722c46a22010d9d1

        SHA512

        9f21966817800a719dc63c259d6b25aa7ece5552225df4bd6384a480938113bff40a8c92e21fdc5509a84f17e39c69b832787048dade2795982929b9a0209279

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDA

        Filesize

        482B

        MD5

        4202eb3c9991cc43540f0865c35fa352

        SHA1

        cac733b39626d41b74004c8ce58d4588724dd778

        SHA256

        f87d3f2e82b2c953f7b567d9629182cd98bd42a6c87d8a22af5e084367f96063

        SHA512

        4f166f9b21c36e567b1b65ba7e58e41d3687e87e6c97f082632b2f01a8fe077c9ecf577222bd5a52155d3e694badc4af62e8ae0b0982e3a3fac641d1e8adcf53

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691

        Filesize

        486B

        MD5

        4cbe5062f5d582250d25c6aec8dbe1d4

        SHA1

        f0eb389bf532348661ad6e33ecc597d63f69edb5

        SHA256

        be1923dc6839418bc52df7cc745f5afd1e731d05b39e4da3fa57749b0c19613b

        SHA512

        a5c6369df61c993bea170cf17b0595bc7a1df793b95af12f0291a9fe629a431b6bf07b5b3e9664d0333923f1a62163bb29561a12a733fef1fa83019cb25e1704

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D

        Filesize

        458B

        MD5

        88a1dc90719bc096c153d55432f39b00

        SHA1

        584c2f86872c5493fe018b3d7fa55cfcc02a8318

        SHA256

        fdac48634f9ea05a198c10e5930a89dd81dc495da76a7c830297052453592f2e

        SHA512

        2a3d5d185c083b182bcf2993e1c42543d204cfd5b7d1972ff9d34fcc1c8e6c7861e28677dda6511eb2c714ac361c2a746216fa5850cc6b9984ff8d2062179dc2

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\BKJKJEHJJD.exe.log

        Filesize

        226B

        MD5

        916851e072fbabc4796d8916c5131092

        SHA1

        d48a602229a690c512d5fdaf4c8d77547a88e7a2

        SHA256

        7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

        SHA512

        07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

      • memory/64-121-0x00000000006B0000-0x00000000006C2000-memory.dmp

        Filesize

        72KB

      • memory/1580-105-0x0000000000400000-0x0000000000643000-memory.dmp

        Filesize

        2.3MB

      • memory/1580-4-0x0000000000400000-0x0000000000643000-memory.dmp

        Filesize

        2.3MB

      • memory/1580-9-0x0000000000400000-0x0000000000643000-memory.dmp

        Filesize

        2.3MB

      • memory/1580-10-0x0000000000400000-0x0000000000643000-memory.dmp

        Filesize

        2.3MB

      • memory/1580-11-0x0000000061E00000-0x0000000061EF3000-memory.dmp

        Filesize

        972KB

      • memory/1580-98-0x0000000000400000-0x0000000000643000-memory.dmp

        Filesize

        2.3MB

      • memory/2004-109-0x0000000000680000-0x00000000006CA000-memory.dmp

        Filesize

        296KB

      • memory/2084-124-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/2084-142-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/2084-127-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/2084-144-0x000000001FC40000-0x000000001FE9F000-memory.dmp

        Filesize

        2.4MB

      • memory/2084-158-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/2084-206-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/2084-207-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/2084-128-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/2084-214-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/2084-215-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/2084-159-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/2084-143-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/2084-176-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/2084-175-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/2560-6-0x00000000748C0000-0x0000000075070000-memory.dmp

        Filesize

        7.7MB

      • memory/2560-1-0x0000000000290000-0x00000000002C8000-memory.dmp

        Filesize

        224KB

      • memory/2560-2-0x00000000748C0000-0x0000000075070000-memory.dmp

        Filesize

        7.7MB

      • memory/2560-0-0x00000000748CE000-0x00000000748CF000-memory.dmp

        Filesize

        4KB

      • memory/2560-7-0x00000000748C0000-0x0000000075070000-memory.dmp

        Filesize

        7.7MB

      • memory/3428-115-0x0000000000400000-0x0000000000459000-memory.dmp

        Filesize

        356KB

      • memory/3428-111-0x0000000000400000-0x0000000000459000-memory.dmp

        Filesize

        356KB

      • memory/3428-113-0x0000000000400000-0x0000000000459000-memory.dmp

        Filesize

        356KB

      • memory/3700-273-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/3700-274-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/3700-275-0x0000000020350000-0x00000000205AF000-memory.dmp

        Filesize

        2.4MB

      • memory/3700-289-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/3700-290-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/4280-103-0x0000000000CB0000-0x0000000000D06000-memory.dmp

        Filesize

        344KB

      • memory/4280-117-0x0000000071E00000-0x00000000725B0000-memory.dmp

        Filesize

        7.7MB

      • memory/4280-99-0x0000000071E0E000-0x0000000071E0F000-memory.dmp

        Filesize

        4KB

      • memory/4280-104-0x0000000071E00000-0x00000000725B0000-memory.dmp

        Filesize

        7.7MB